CN110247921A - A kind of polled data cochain method and its equipment for applying intelligent contract - Google Patents

A kind of polled data cochain method and its equipment for applying intelligent contract Download PDF

Info

Publication number
CN110247921A
CN110247921A CN201910547041.5A CN201910547041A CN110247921A CN 110247921 A CN110247921 A CN 110247921A CN 201910547041 A CN201910547041 A CN 201910547041A CN 110247921 A CN110247921 A CN 110247921A
Authority
CN
China
Prior art keywords
client
polled data
public key
polled
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910547041.5A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910547041.5A priority Critical patent/CN110247921A/en
Publication of CN110247921A publication Critical patent/CN110247921A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C13/00Voting apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of polled data cochain methods and its equipment for applying intelligent contract, which comprises block chain node receives the polled data cochain request that the first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client;Receive the inquiry request of the polled data of the second client;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;After verification passes through, the polled data inquiry request is sent to first client, includes the second client public key in the polled data inquiry request;Receive the polled data inquiry response that first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and after verification passes through, the polled data of second client public key encryption is executed cochain process.The application can disclose polled data cochain credible.

Description

A kind of polled data cochain method and its equipment for applying intelligent contract
Technical field
This application involves block chain technical field more particularly to a kind of polled data cochain method for applying intelligent contract and Its equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
Existing ballot platform is all the database using centralization, saves the ballot number of commodity, and the polling hours are used The contents such as the mobile phone that the ballot at family uses;However, the database of ballot platform, there is data to be tampered, the authenticity of data The problems such as operation platform that cannot be guaranteed, and vote modifies the ballot number of certain commodity, deletes situations such as user's difference is commented.Especially To some small ballot platforms, the Information Security and authenticity of commodity all be cannot be guaranteed.
Therefore, how can not distort based on block chain, the data for platform of voting are stored in block chain by believable mode On, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill Art.
Summary of the invention
To solve the above-mentioned problems, the application provides a kind of polled data cochain method for applying intelligent contract and its sets It is standby, it can allow the data cochain of ballot, so that the polled data on chain is credible, it is open and clear.
The application first aspect provides a kind of polled data cochain method for applying intelligent contract, which comprises
Block chain node receives the polled data cochain request that the first client is sent, the polled data cochain request packet Include the polled data of the first client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies By rear, the cochain process of the polled data is executed;
The block chain node receives the inquiry request of the polled data of the second client;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;
After verification passes through, the block chain node sends the polled data inquiry request to first client, institute Stating in polled data inquiry request includes the second client public key, so that first client, second client public key The polled data is encrypted;
The block chain node receives the polled data inquiry response that first client is sent, the votes it is investigated that Ask the polled data that response includes the encryption of the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies By rear, the polled data of second client public key encryption is executed into cochain process.
In one possible implementation, the method also includes: the block chain node receives second client End sends polled data inquiry request;
The block chain node sends polled data inquiry response to second client, and the polled data inquiry is rung It should include the polled data of the second client public key encryption, in order to which the second client own private key is to second visitor The polled data of family end public key encryption is decrypted.
In one possible implementation, the polled data is that the corresponding user of first client is flat in ballot The operation data of platform, including ballot number, polling hours and ballot type.
In one possible implementation, the first client own public key encrypts the polled data, tool Body are as follows: first client carries out the encryption of preset ratio with own public key to the polled data.
In one possible implementation, the polled data includes relating attribute and dereferenced attribute;Wherein, described The attribute value of polled data relating attribute is superimposed automatically.
The application second aspect provides a kind of polled data cochain equipment for applying intelligent contract, and the equipment is block chain Node, the equipment include receiving unit, processing unit and transmission unit;Wherein,
The receiving unit, receives the polled data cochain request that the first client is sent, and the polled data cochain is asked Seek the polled data including first client public key encryption;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, executes the cochain process of the polled data;
The receiving unit receives the inquiry request of the polled data of the second client;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified;
After verification passes through, the transmission unit sends the polled data inquiry request to first client, described It include the second client public key in polled data inquiry request, so that first client, second client public key pair The polled data encryption;
The receiving unit receives the polled data inquiry response that first client is sent, the votes it is investigated that Ask the polled data that response includes the encryption of the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, the polled data of second client public key encryption is executed into cochain process.
In one possible implementation, the receiving unit, receive second client send votes it is investigated that Ask request;The transmission unit sends polled data inquiry response to second client, the polled data inquiry response Polled data including the encryption of the second client public key, in order to which the second client own private key is to second client The polled data of end public key encryption is decrypted.
In one possible implementation, the polled data is that the corresponding user of first client is flat in ballot The operation data of platform, including ballot number, polling hours and ballot type.
In one possible implementation, the first client own public key encrypts the polled data, tool Body are as follows: first client carries out the encryption of preset ratio with own public key to the polled data.
In one possible implementation, the polled data includes relating attribute and dereferenced attribute;Wherein, described The attribute value of polled data relating attribute is superimposed automatically.
The application can allow the data cochain of ballot, so that the polled data on chain is credible, it is open and clear.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of polled data cochain method flow schematic diagram for applying intelligent contract provided by the embodiments of the present application;
Fig. 2 is the polled data cochain method flow signal of the intelligent contract of another application provided by the embodiments of the present application Figure;
Fig. 3 is a kind of polled data cochain device structure schematic diagram for applying intelligent contract provided by the embodiments of the present application.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc. It can be according to application software and the equipment that can be networked.
As shown in Figure 1, a kind of polled data cochain method for applying intelligent contract, the method includes the steps S101- S107。
S101, block chain node receive the polled data cochain request that the first client is sent, the polled data cochain Request includes the polled data of first client public key encryption.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client, After verification passes through, the cochain process of the polled data is executed.
S103, the block chain node receive the inquiry request of the polled data of the second client.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client.
S105, after verification passes through, the block chain node sends the polled data inquiry request to first client End includes the second client public key in the polled data inquiry request, so that first client is with second client End public key encrypts the polled data.
S106, the block chain node receive the polled data inquiry response that first client is sent, the ballot Data query response includes the polled data of the second client public key encryption.
S107, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client, After verification passes through, the polled data of second client public key encryption is executed into cochain process.
In one example, the method also includes: the block chain node receives second client and sends ballot Data inquiry request;The block chain node sends polled data inquiry response to second client, the polled data Inquiry response includes the polled data of the second client public key encryption, in order to which the second client own private key is to described The polled data of second client public key encryption is decrypted.
In one example, the polled data is operand of the corresponding user of first client in ballot platform According to, including ballot number, polling hours and ballot type.
In one example, the first client own public key encrypts the polled data, specifically: described One client carries out the encryption of preset ratio with own public key to the polled data.
In one example, the polled data includes relating attribute and dereferenced attribute;Wherein, the polled data is closed Attribute attribute value is superimposed automatically.
In above-mentioned example, operator of first client as polled data, the second client is looked into as polled data Inquiry person;For some specific ballot platform, every user either polled data operator, be also possible to polled data Inquiry.
Below by taking Fig. 2 as an example, above-mentioned polled data cochain method is illustrated, the method comprising the steps of S201- S214。
S201, the first client are encrypted with the polled data that public key generates itself, which includes The user's operations such as ballot number, polling hours, the IP address of user and the account number cipher of user of the user on ballot platform The data that behavior generates.
First client is encrypted with the polled data that own public key generates itself, which can be votes It is encrypted according to whole fields, is also possible to encrypt the part field of the polled data, such as: only to the comment of privacy Content is encrypted;It is also possible to user not encrypt the polled data.
In addition, the polled data includes being divided into two attribute, relating attribute and dereferenced attribute.Such as: when user votes Between, belong to dereferenced attribute, the polling hours of every user may be stored on block chain;Such as: the quantity of user's ballot, It is exactly relating attribute, includes ballot quantity in the data format of a commodity, as long as there is user to vote the commodity, the quotient The ballot quantity of product can be superimposed automatically.
Ballot type includes commodity ballot, personal preference ballot, clothes dress ornament ballot etc.;Such as: individual is to season Hobby ballot, likes ballot to the collocation of clothes, likes ballot to the style of clothes, the moulding hobby ballot etc. to hair.
S202, the first client send polled data cochain and request to give block chain node.
S203, triggers the verification intelligence contract on block chain, which carries out the identity of the first client Verification, executes the cochain process of the polled data.
The verification refer to judge first client whether be the ballot platform user, the only user of the ballot platform It can just have permission and the polled data is subjected to cochain.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block It is placed on next block of current block, as new block cochain.
S204, block chain node send polled data cochain and respond to the first client.
S205, the second client send polled data inquiry request and give block chain node, the polled data inquiry request Including the second client public key.
At this point, the corresponding user of the second client can be after seeing the polled data, which is looked into It askes.The first client and the second client are all the terminal devices for being equipped with decentralization application software in the application, all may be used It is interacted with directly clicking through row information with the block chain link on block chain.
S206, triggers the verification intelligence contract on block chain, which carries out the identity of the second client Verification.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S207, after verification passes through, which sends polled data inquiry request to the first client, the votes It is investigated that asking request includes the second client public key.
S208, the first client encrypt the polled data with second client public key.
S209, the first client send polled data inquiry response and give the block chain node, the polled data inquiry response Polled data including the encryption of the second client public key.
S210 triggers the verification intelligence contract on block chain, identity of the verification intelligence contract to first client It is verified, and the polled data of second client public key encryption is executed into cochain process.
S211, the block chain node send polled data inquiry response to the second client.
S212, the second client send polled data inquiry request and give block chain node.
S213, the block chain node send the polled data inquiry response and give second client, polled data inquiry Response includes the polled data of the second client public key encryption.
S214, the second client are decrypted with the polled data that own private key encrypts second client public key, are obtained To the polled data.
The application can allow the data cochain of ballot, and the cochain process is open and clear, any user of same ballot platform It can check the polled data;It ensure that the authenticity of polled data.Also, user can be according to oneself hobby, to throwing Ticket data encrypt or do not encrypt, and improves user experience.
As shown in figure 3, a kind of polled data cochain equipment for applying intelligent contract, the equipment are block chain node, institute Stating equipment includes receiving unit, processing unit and transmission unit.
The receiving unit, receives the polled data cochain request that the first client is sent, and the polled data cochain is asked Seek the polled data including first client public key encryption;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, executes the cochain process of the polled data;
The receiving unit receives the inquiry request of the polled data of the second client;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified;
After verification passes through, the transmission unit sends the polled data inquiry request to first client, described It include the second client public key in polled data inquiry request, so that first client, second client public key pair The polled data encryption;
The receiving unit receives the polled data inquiry response that first client is sent, the votes it is investigated that Ask the polled data that response includes the encryption of the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, the polled data of second client public key encryption is executed into cochain process.
In one example, the receiving unit receives second client and sends polled data inquiry request;It is described Transmission unit sends polled data inquiry response to second client, and the polled data inquiry response includes the second visitor The polled data of family end public key encryption, in order to which the second client own private key encrypts second client public key Polled data be decrypted.
In one example, the polled data is operand of the corresponding user of first client in ballot platform According to, including ballot number, polling hours and ballot type.
In one example, the first client own public key encrypts the polled data, specifically: described One client carries out the encryption of preset ratio with own public key to the polled data.
In one example, the polled data includes relating attribute and dereferenced attribute;Wherein, the polled data is closed Attribute attribute value is superimposed automatically.
The application can allow the data cochain of ballot, and the cochain process is open and clear, any user of same ballot platform It can check the polled data;It ensure that the authenticity of polled data.Also, user can be according to oneself hobby, to throwing Ticket data encrypt or do not encrypt, and improves user experience.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of polled data cochain method for applying intelligent contract, which is characterized in that the described method includes:
Block chain node receives the polled data cochain request that the first client is sent, and the polled data cochain request includes institute State the polled data of the first client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through Afterwards, the cochain process of the polled data is executed;
The block chain node receives the inquiry request of the polled data of the second client;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;
After verification passes through, the block chain node sends the polled data inquiry request to first client, the throwing It include the second client public key in ticket data inquiry request, so that first client is with second client public key to institute State polled data encryption;
The block chain node receives the polled data inquiry response that first client is sent, and the polled data inquiry is rung It should include the polled data of the second client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through Afterwards, the polled data by second client public key encryption executes cochain process.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives second client and sends polled data inquiry request;
The block chain node sends polled data inquiry response to second client, the polled data inquiry response packet The polled data of the second client public key encryption is included, in order to which the second client own private key is to second client The polled data of public key encryption is decrypted.
3. the method according to claim 1, wherein the polled data is the corresponding use of first client Family is in the operation data of platform of voting, including ballot number, polling hours and ballot type.
4. the method according to claim 1, wherein the first client own public key is to the votes According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the polled data.
5. the method according to claim 1, wherein the polled data includes relating attribute and dereferenced category Property;Wherein,
The attribute value of the polled data relating attribute is superimposed automatically.
6. a kind of polled data cochain equipment for applying intelligent contract, which is characterized in that the equipment is block chain node, described Equipment includes receiving unit, processing unit and transmission unit;Wherein,
The receiving unit receives the polled data cochain request that the first client is sent, the polled data cochain request packet Include the polled data of the first client public key encryption;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client Verification executes the cochain process of the polled data after verification passes through;
The receiving unit receives the inquiry request of the polled data of the second client;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client Verification;
After verification passes through, the transmission unit sends the polled data inquiry request to first client, the ballot It include the second client public key in data inquiry request, so that first client is with second client public key to described Polled data encryption;
The receiving unit, receives the polled data inquiry response that first client is sent, and the polled data inquiry is rung It should include the polled data of the second client public key encryption;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client The polled data of second client public key encryption after verification passes through, is executed cochain process by verification.
7. equipment according to claim 6, which is characterized in that
The receiving unit receives second client and sends polled data inquiry request;
The transmission unit sends polled data inquiry response to second client, the polled data inquiry response packet The polled data of the second client public key encryption is included, in order to which the second client own private key is to second client The polled data of public key encryption is decrypted.
8. equipment according to claim 6, which is characterized in that the polled data is the corresponding use of first client Family is in the operation data of platform of voting, including ballot number, polling hours and ballot type.
9. equipment according to claim 6, which is characterized in that the first client own public key is to the votes According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the polled data.
10. equipment according to claim 6, which is characterized in that the polled data includes relating attribute and dereferenced category Property;Wherein,
The attribute value of the polled data relating attribute is superimposed automatically.
CN201910547041.5A 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract Pending CN110247921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547041.5A CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547041.5A CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Publications (1)

Publication Number Publication Date
CN110247921A true CN110247921A (en) 2019-09-17

Family

ID=67888964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547041.5A Pending CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Country Status (1)

Country Link
CN (1) CN110247921A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738783A (en) * 2019-10-15 2020-01-31 腾讯科技(深圳)有限公司 System, method, device, equipment and readable storage medium for updating voting data
CN111475579A (en) * 2020-04-21 2020-07-31 吴海娟 Uplink voting method and system for intelligent contract in data sharing alliance chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738783A (en) * 2019-10-15 2020-01-31 腾讯科技(深圳)有限公司 System, method, device, equipment and readable storage medium for updating voting data
CN111475579A (en) * 2020-04-21 2020-07-31 吴海娟 Uplink voting method and system for intelligent contract in data sharing alliance chain

Similar Documents

Publication Publication Date Title
KR101589192B1 (en) Identity authentication and management device and method thereof
CN110278270A (en) A kind of polled data cochain method and its equipment based on block chain
CN110232286A (en) A kind of electric quotient data cochain method and its equipment for applying intelligent contract
CN109492424A (en) Data assets management method, data assets managing device and computer-readable medium
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN109818965B (en) Personal identity verification device and method
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
CN110266698A (en) Pass through the Knowledge Sharing data cochain method and its equipment of block chain
CN110263100A (en) Using the shared economic data cochain method and its equipment of intelligent contract
CN105049209B (en) Dynamic password formation method and device
CN110232287A (en) Pass through the shared economic data cochain method and its equipment of block chain
CN110225056A (en) A kind of evaluation data cochain method and its equipment for applying intelligent contract
CN110263562A (en) A kind of evaluation data cochain method and its equipment based on block chain
CN110266695A (en) Using the lottery data cochain method and its equipment of intelligent contract
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
CN110266691A (en) Credit data cochain method and its equipment based on block chain
CN110233852A (en) Prize drawing data cochain method and its equipment based on block chain
CN110213296A (en) It is a kind of that data cochain method and its equipment are thumbed up based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication